Back to Search Start Over

A Novel Scheme for Malicious Nodes Detection in Cloud Markets Based on Fuzzy Logic Technique

Authors :
Ayoub Alsarhan
Abdel-Rahman Al-Ghuwairi
Esra'a Alshdaifat
Hasan Idhaim
Omar alkhawaldeh
Source :
International Journal of Interactive Mobile Technologies (iJIM); Vol. 16 No. 03 (2022); pp. 136-150, International Journal of Interactive Mobile Technologies, Vol 16, Iss 03 (2022)
Publication Year :
2022
Publisher :
International Association of Online Engineering (IAOE), 2022.

Abstract

Cloud security vulnerabilities have recently become more prevalent around the world, posing a threat to cloud service providers' (CSPs) ability to respond to client demands. In cloud market, the requests are announced by the client nodes to their CSP. A malicious node can alter a client's request, resulting in the next cloud market collapse, decreased reliability, and data leaking.To identify malicious nodes in the cloud market, a novel fuzzy multiple criterion decision making scheme is suggested. Authentication test, trust level, traffic size, and node activity levels are all taken into consideration simultaneously as the major criteria for identifying malicious nodes. For each node, the CSP uses fuzzy Integral to generate a composite value based on these criteria. The malicious node is then removed from the cloud market using this composite value. The simulation results demonstrated the potential of the proposed method to prevent nodes in the cloud market from running malware or software that can be used to degrade quality of service by exhausting resources in the cloud market.

Details

ISSN :
18657923
Volume :
16
Database :
OpenAIRE
Journal :
International Journal of Interactive Mobile Technologies (iJIM)
Accession number :
edsair.doi.dedup.....deee39751233db3c36e5d5dd5611c5b7